CN103229184A - Method and system for accessing secure resources - Google Patents
- ️Wed Jul 31 2013
CN103229184A - Method and system for accessing secure resources - Google Patents
Method and system for accessing secure resources Download PDFInfo
-
Publication number
- CN103229184A CN103229184A CN2011800571182A CN201180057118A CN103229184A CN 103229184 A CN103229184 A CN 103229184A CN 2011800571182 A CN2011800571182 A CN 2011800571182A CN 201180057118 A CN201180057118 A CN 201180057118A CN 103229184 A CN103229184 A CN 103229184A Authority
- CN
- China Prior art keywords
- resource
- authentication
- portable set
- external unit
- secure resources Prior art date
- 2010-09-28 Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 69
- 230000007246 mechanism Effects 0.000 claims description 37
- 238000004891 communication Methods 0.000 claims description 24
- 230000005540 biological transmission Effects 0.000 claims description 19
- 230000004913 activation Effects 0.000 claims description 16
- 230000004044 response Effects 0.000 claims description 11
- 210000001525 retina Anatomy 0.000 claims description 11
- 230000008569 process Effects 0.000 abstract description 29
- 238000012795 verification Methods 0.000 abstract 2
- 230000015654 memory Effects 0.000 description 27
- 230000014509 gene expression Effects 0.000 description 16
- 238000010586 diagram Methods 0.000 description 15
- 238000012545 processing Methods 0.000 description 12
- 230000006870 function Effects 0.000 description 10
- 230000005611 electricity Effects 0.000 description 6
- 238000009434 installation Methods 0.000 description 3
- 230000007958 sleep Effects 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 230000003213 activating effect Effects 0.000 description 2
- 230000000712 assembly Effects 0.000 description 2
- 238000000429 assembly Methods 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 230000002618 waking effect Effects 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000005059 dormancy Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 230000004807 localization Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/14—With a sequence of inputs of different identification information
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Computing Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A system and method for accessing secured resources by using a porlable device. When a user having such portable device is within close proximity to a locked door or other secured resources, a verification process can be automatically initiated on the device. The user verification can utilize all the input and sensor methods on the device. Once the identification process has successfully completed, an access code can be transmitted to the locked door or the device via a wired or wireless network. Reduced electronic devices required at these locked doors and more dynamic security measures are allowed. .
Description
Technical field
The present invention generally relates to a kind of method and system that is used to enable to the secure access of secure resources, more specifically, the present invention relates to discern the grade of access right, can obtain access right and authorize described equipment and/or user based on the safe class and the user of equipment.
Background technology
Usually, in the secure resources system of for example door, computing machine and other equipment, when the identity of having verified the user in physical connection to the card reader place of described, computing machine and other equipment and access right, with the release safety equipment.When having a plurality of equipment in the security system, such identifying is consuming time and inconvenient to the user, because described security system needs the user to carry out described identifying at each safety equipment place one by one, also increased the cost of security system because need more electronic installation.
Summary of the invention
Therefore, the present invention is directed to a kind of system and method that uses portable set access security resource.When the user with such portable set is in close proximity to the door locked or during equipment (resource), can begins proof procedure automatically on described equipment.User rs authentication can utilize all inputs on the equipment and/or any required subclass of sensor, method or ability or input/sensor, method.In case completed successfully identifying, can transmit access code to door of locking or equipment via wired or wireless network.This allows to reduce an electronic installation that the place needs of locking at these, and allows more dynamic safety practice.
One embodiment of the present of invention are obtained method to the access right of the safety zone of resource (obtaining method to the access right of the safety zone of resource at external unit) at a kind of external unit.Described method comprises transmitting discerns the signal that described equipment can authenticate.Receive and the communicating by letter of described resource from the equipment discerned.In response to the beginning of communication, described authentication mechanism normally is used to discern the hardware device of the attribute of user of described equipment by the one or more authentication mechanisms that transmit described equipment.Reception is to the request of the one or more use in the authentication mechanism.Token from described equipment each to the authentication mechanism that described resource transmission is asked.In response to accept one or more in the described token by described resource and obtain access right to the safety zone.
Another embodiment of the present invention is obtained method to the access right of the safety zone of above-described resource at external unit, and wherein said communication is wireless.
Another embodiment of the present invention is obtained method to the access right of the safety zone of above-described resource at external unit, and wherein said equipment is portable set.
An embodiment more of the present invention obtains method to the access right of the safety zone of above-described resource at external unit, wherein said authentication mechanism be described equipment all.
An embodiment more of the present invention obtains method to the access right of the safety zone of above-described resource at external unit, and wherein said authentication mechanism is a biometric.
An embodiment more of the present invention obtains method to the access right of the safety zone of above-described resource at external unit, and wherein said external unit transmits active information to described resource.
An embodiment more of the present invention authorizes method to the access right of the safety zone of described resource at a kind of resource to external unit.Described method comprises from the described external unit received signal that can authenticate.Beginning is communicated by letter with described external unit.Receive the tabulation of one or more authentication tokens that described external unit can provide, described authentication token is the result of hardware device who is used to discern the attribute of user of described external unit.Transmission is to the request of one or more authentication tokens.Reception is in response to one or more authentication tokens of described request.Based on the acceptability of one or more authentication tokens and authorize the access right of external unit to the safety zone.
An embodiment more of the present invention authorizes method to the access right of the safety zone of above-described described resource at a kind of resource, and wherein said authentication token is a biometric data.
An embodiment more of the present invention authorizes method to the access right of the safety zone of above-described described resource at a kind of resource, and wherein said communication is wireless.
An embodiment more of the present invention authorizes by the method for external unit to the access right of the safety zone of described resource at a kind of resource, and wherein said resource transmits activation signal to described external unit.This activation can be the signal that for example activates external unit and/or electrical power for operation is provided to described equipment.
An embodiment more of the present invention is at a kind of equipment to the access right of the safety zone of resource (at the equipment that is used to obtain to the access right of the safety zone of resource) that obtains.Described equipment comprises that transmission is with first forwarder of described recognition of devices for the signal that can authenticate.First receiver receives the beginning of communicating by letter with described resource.In response to the beginning of described communication, described authentication mechanism is the hardware device that is used to discern the attribute of user of described equipment to controller by the one or more authentication mechanisms that transmit described equipment.Second receiver receives the request to the one or more use in the authentication mechanism.The token of each in the authentication mechanism that the transmission of second forwarder is asked.Described equipment is also in response to accepted one or more in the described token by described resource and obtain access right to the safety zone.
An embodiment more of the present invention is at a kind of above-described described equipment, and wherein said communication is wireless.
An embodiment more of the present invention authorizes authentication ' unit to the resource of the access right of the safety zone of described resource (at being used for authorizing authentication ' unit to the resource of the access right of the safety zone of described resource to external unit) at a kind of being used for to external unit.Described authentication ' unit comprises first receiver so that the external unit received signal from authenticating.Communicator begins the radio communication with external unit.Second receiver receives the tabulation of one or more authentication tokens that external unit can provide, and described authentication token is the result of hardware device who is used to discern the attribute of user of external unit.Forwarder transmits the request to one or more authentication tokens.The 3rd receiver receives one or more authentication tokens in response to described request.Authentication ' unit is based on the acceptability of one or more authentication tokens and authorize the access right of external unit to the safety zone.
Description of drawings
In order to realize above-mentioned with relevant purpose, some illustrative embodiment of the present invention is described here in conjunction with following description and accompanying drawing.These embodiment indication can be used the variety of way of principle of the present invention, but wherein a few, however the invention is intended to comprise all such aspects and their equivalent.When considered in conjunction with the accompanying drawings, other advantages of the present invention, embodiment and novel characteristics can become clear from following description of the present invention.In conjunction with the accompanying drawings the mode of understanding that can be best by example provide but be not intended to the present invention is only limited to the following description of described specific embodiment, wherein:
Fig. 1 illustrates the example of the system of one embodiment of the present of invention;
Fig. 2 illustrates the example of the synoptic diagram of embodiments of the invention;
Fig. 3 illustrates the example of series of steps according to an embodiment of the invention;
Fig. 4 illustrates the example of authentication mechanism according to an embodiment of the invention;
Fig. 5 illustrates the example of security service module according to an embodiment of the invention;
Fig. 6 diagram is visited the series of steps of the service in the secure resources with a plurality of safe classes according to an embodiment of the invention;
Fig. 7 illustrates the example of portable set according to an embodiment of the invention;
Fig. 8 illustrates the example of secure resources according to an embodiment of the invention;
Fig. 9 illustrates the process flow diagram of embodiments of the invention, and wherein said portable set provides electric power to described secure resources;
Figure 10 illustrates the process flow diagram of embodiments of the invention, and wherein said secure resources is provided for authenticating the electric power of described portable set;
Figure 11 illustrates the processing of portable set and the example of memory module.
Embodiment
Notice in this is open especially in claim and/or paragraph, for example " comprise ", the term of " by comprising " and " having comprised " etc. can have the implication of giving it in united states patent law; That is, they can mean " comprising ", " involved ", " having comprised " and " comprise, but be not limited to " etc., and take into account the element that does not clearly describe in detail.For example " substantially by ... form " and the term of " substantially by ... formation " have the implication that in united states patent law, belongs to them; That is, they take into account the element that does not clearly describe in detail, but get rid of the element that finds in the prior art or influence basic or novel characteristic of the present invention.Following description discloses these and other embodiment, or these and other embodiment are clearly from following description, and comprises these and other embodiment by following description.As using in this application, term " assembly " refers to the generation entity relevant with computing machine with " system ", and described entity is combination, software or the executory software of hardware, hardware and software.For example, assembly can be but be not limited to be thread, program and/or the computing machine of the process moved, processor, object, executable file, execution on processor.By illustrated mode, application of carrying out on server and described server can be assemblies.One or more assemblies can exist in the thread of process and/or execution, and assembly can be on a computing machine localization and/or between two or more computing machines, distribute.Other embodiment of the present invention comprise that above-described but operative installations is implemented or are encoded as by in conjunction with one or more processors of one or more electronic storage mediums operations method with the computer code carried out.
In addition, for illustrative purposes, various embodiment of the present invention is described in detailed description, and embodiments of the invention comprise described method, and can use one or more devices of the treating apparatus that for example is couple to electronic media to implement embodiments of the invention.Can go up the storage embodiments of the invention at electronic media (electronic memory, RAM, ROM, EEPROM), or embodiments of the invention are encoded to by the computer code of carrying out in conjunction with one or more processors of one or more electronic storage mediums operation (for example, source code, object identification code or any suitable programming language).This electronic storage medium can comprise can store the data represented with for example electronic form of position, byte, kilobyte, waveform, electronic signal, digital format and other data types and form be used for data for example such as one or more non-provisional electronic storage medium or other electronic repository or the electronics memory location of register.
Can use one or more treatment facilities or processing module to implement embodiments of the invention.Can couple treatment facility or module, make a plurality of parts of processing and/or data manipulation to carry out at one or more treatment facilities place and between a plurality of treatment facilities, to share or to transmit.
Fig. 1 illustrates the example of the
network system100 of supporting embodiments of the
invention.System100 shown in Fig. 1 comprises
network102,
secure resources104,
server106 and has a plurality of portable set 112(a), 112(b) ... 112(n) the
user110 of the one or more access right in (wherein " n " is any suitable numeral).
102 is for example to be adapted to be the computing machine of the transmission and the link of deal with data or any combination of treatment facility.Network 102 can be privately owned Internet protocol (IP) network and the publicly-owned IP network that for example can utilize the Internet of WWW (www) function of browse.The example of cable network be to use the network of communication bus and MODEM or DSL line or Local Area Network or wide area network (WAN) so as to transmit and receiving terminal between data.The example of wireless network is a WLAN.Global system for mobile communications (GSM) is another example of wireless network.The GSM network is divided into three main systems, and described three main systems are exchange system, base station system and operation and back-up system (GSM).In addition, IEEE802.11(Wi-Fi) be normally used wireless network in computer system, it enables the Internet or has the connection of the other machines of Wi-Fi function.The Wi-Fi Web broadcast can be by the radiowave of the Wi-Fi receiver reception that is connected to the various computing machine.
104 can be the zone of for example door, computing machine (or addressable part of storer or computer equipment), safe physical cell and/or for example database, website or other restrictions or part restriction or network or the electronic position of the part of the network of VPN for example.In some cases,
secure resources104 can have a plurality of safe classes, for example provides from simple Email and calendar access to weigh for example financial report, address book and/or classified papers or have the more restricted zone in other zones of the information that needs limiting access or the computer network of the service range of the access right of grade or resource.The security system that is connected to secure
resources104 can be discerned
user110 and just carry the
portable set112 that can authenticate, and opens the wired or wireless connection to this portable set.
Server module or equipment or
unit106 normally have one or more processors of the storer that is associated, for example such as desktop PC, notebook, PDA(Personal Digital Assistant), radio hand-held equipment, cell phone, PLAYSTATION TM, and PSP TMDeng computing machine or other treatment facilities.They can oneself be handled and storage data or only can be after the access process of another location and data (that is thin and fat terminal) storage.
108 is shown as and comprises that
user110 and
user110 can have access right or proprietorial one or more portable set 112.At
user terminal108,
user110 can carry or visit a plurality of portable set 112(a) ... (n) one or more in (being referred to as 112 usually here).
Portable set112 generally includes the equipment with processing power and storer and Output Display Unit, for example, and cell phone, PDA(Personal Digital Assistant), radio hand-held equipment, PLAYSTATION TM, and PSP TMDeng.
Portable set112 can own processing and storage and video data, or only can be after the access process of another location with data (that is thin and fat terminal) storage and show the data that visit or obtain.The function of
server106 can also be that the part of
secure resources104 and/or
portable set112 also is embodiments of the invention.
Use the
user terminal108 of
portable set112 to submit security token to
server module106 via network 102.
Server module106 receives security token and sends described token to secure
resources104 from user terminal 108.Then,
secure resources104 is carried out identifying based on the token that is received.
104,
server module106 and
user terminal108 are couple to
network102 via the two-way communication medium that is associated, and the described two-way communication medium that is associated can be for example such as universal serial bus or other the wired or wireless transmission mediums of IEEE1394.
Secure resources104,
server module106 and
user terminal108 can be communicator or customer location or subscriber's equipment or client terminal.
Fig. 2 illustrates the synoptic diagram of the example of
system200 according to an embodiment of the invention.
When
user110 wished the
secure resources104 of the zone of restriction of room, chamber or network that visit is for example locked or electronics storage area or database or part, the user used and is shown as his/her portable set (be shown as
element112 and be shown as
element216 in Fig. 1 in Fig. 2) that possesses fingerprint scanner so that carry out wireless or
wire communication250 with the
secure resources104 of the door of for example locking in Fig. 2.If
secure resources104 determines that finger scan is suitable, then
user110 slips over his/her
finger208 on portable set 216.Then,
portable set216 is communicated by letter with
secure resources104 about his/her fingerprint certificate.If fingerprint is accepted by
secure resources104, then release secure resources 104(promptly, the room of locking).
In addition, as shown in Figure 2,
portable set210 and 212 diagrams possess other examples of the portable set of other possible security mechanisms.For example,
portable set210
possess user110 can the input digit password or the digital touch pad and/or the password of user ID or PIN(Personal Identification Number).In addition, portable set 212 possess
user110 can his/her
eye214 of apposition so that the retina scanners of checking personal identification.
Secure resources204 illustrated example are as the secure resources based on another type of the resource of PC.Various secure resources (being shown as 104,204) can be visited by one or more portable sets.Each secure resources (104,204) can have the resource security grade of variation.For example, though may need the retina scanners of particular individual for more high-grade resource security, the keypad with the digital button that allows the input digit sign indicating number can be enough for visit lower security grade resource.
As shown in Figure 2,
secure resources104 can have a plurality of safe classes for different services.Under the sort of situation, when authorizing the user access right and described user when asking specific service to secure resources, the secure token module of security system determines whether to authorize the access right of described user to institute's requested service according to the security token that is provided by described user.
Fig. 3 illustrates the series of steps of access security resource according to an embodiment of the invention.Fig. 3 illustrates the series of steps of for example storing or the process of program code or algorithm on electronic memory or computer-readable medium.For example, can be on the computer-readable medium of for example ROM, RAM, EEPROM, CD, DVD or other nonvolatile memories or non-provisional computer-readable medium the step of storage map 3.Described process can also be to comprise having thereon stored program code so that carry out the module of the electronic memory of described function.This storer is structurized article (article).As shown in Figure 3, described series of steps can be represented as and can be carried out or be carried out in addition so that carry out the function of being discerned by processor, processing unit, and can store described process flow diagram 300 in the one or more storeies that comprise non-provisional medium and signal and/or one or more electronic media and/or computer-readable medium.For example, can be on the computer-readable medium of for example ROM, RAM, CD, DVD or other nonvolatile memories, non-provisional medium the step of storage map 3.Stored program code is structurized element on the electronic memory medium.Can as any storer described herein in and for example in
portable set112,
server106 or
secure resources104 storage as the computer program code of the interchangeable form of process flow diagram 300.Described
process300 starts from beginning step 302.
The user that
step304 expression has a portable set is near secure resources and the request access right to secure
resources.In step306, secure resources is discerned described portable set whether in the scope of secure resources.If do not identify the portable set that can authenticate, then "No"
line307 is guided
step308 into, user thereby portable set can more closely move to secure resources, be in close proximity to (enough near described resource make the distance that described resource can be communicated by letter with portable set) secure resources so that determine described equipment, and in
step304, attempt to ask once more to visit.As by
line311 expressions, can discern the electricity needs of secure resources.With reference to figure 9 this embodiment is described in more detail.In addition, be identified in the obtainable electric power in portable set place.This power level of portable set is useful to activating secure resources (or part of secure resources).The power level of portable set is portable set activation secure resources or the electric power that sends signal to secure resources.Can also determine the activation electric power of secure resources.This activates electric power is that secure resources (or its part) is activated to the required electric power of state of activation from dormancy or unactivated state.In case whether the power level of identification portable set can enough activate described resource (or its part) and make affirmation about the power level of portable set.If portable set electric power is enough, then portable set sends activation signal so that make secure resources activate to secure resources.
The distance that portable set can be communicated by letter with secure resources normally corresponding apparatus transmission electric power and/or receive the function of electric power.If identify the portable set that can authenticate in
step306, then "Yes" line 309 is guided
step310 into, and it can be that the connection of wired or wireless connection is so that discern portable set that
step310 expression security system is opened.Then, in
step312, portable set responds by sending its available authentication mechanism shown in Figure 4.
Whether
step314 expression security system is determined in the available authentication mechanism or made up is to be fit to use.If there is not available authentication mechanism to be fit to, then "No"
line315 is guided
step316 into, and security system determines whether to exist any other portable set that is carried by the user in step 316.If determine that the user does not carry any other portable set that can authenticate, then "No" line 321 is guided
step330 into, described
step330 expression end step.Otherwise if identify other portable sets, then "Yes"
line319 draws back step 310.Therefore, the portable set authentication capability determines iteration and identification repeatedly that relate to enough authentication capabilities or function.
Return refer
step314, if it is acceptable determining in the available authentication mechanism or making up, then "Yes" line 317 is guided
step318 into, and which authentication mechanism is described
step318 expression security system use via wired or wireless communication notice portable set corresponding to the authentication mechanism needs that are fit to.
Step320 is illustrated in portable set and receives after the information about required security mechanism, and described portable set will obtain security token from user and/or portable set by required authentication mechanism.For example, if required authentication mechanism is a retina scanners, then portable set will ask the user that his/her eye is placed near the retina scanners, if and required authentication mechanism is the fingerprint scanner, then portable set will ask the user that his/her finger is placed near the fingerprint scanner.Then in
step322, be transmitted in the security token that obtains in the
step320 to the security system of secure resources.
324 expression security system determines whether the security token that is received is correct and/or is enough to authorize the access right of user to secure resources.If security token is incorrect or not enough, then "No" line 325 is guided
step326 into, and described
step326 expression security system will require portable set that other security tokens are provided.If portable set does not provide more security token, then "No" line 329 draws back
step316, and described
step316 expression security system determines whether to exist any other portable set that is carried by the user.If in
step326, portable set will provide other security tokens that obtain from the user, and then "Yes"
line331 draws back step 320.Return refer
step324, if security token is correct in enough, then "Yes"
line327 is guided
step328 into, and the user is authorized in described
step328 expression access right to secure resources, and arrives end
step330.
Mention about Fig. 2 as the front,
secure resources104 can have a plurality of safe classes for different services.In this case, when authorizing the user access right and described user when asking specific service to secure resources, the secure token module of security system determines whether to authorize the access right of user to institute's requested service according to customer-furnished security token.
Fig. 4 diagram is according to an embodiment of the invention about the example of the information of authentication mechanism 400.The portable set that can authenticate is to the information of security system transmission about the
authentication mechanism400 of described portable set, and described
authentication mechanism400 comprises for
example physics keypad402, the touch-
screen404 that is used for virtual keypad, the touch-screen or the
touch pad406 that are used for the gesture input, the
motion sensor408 that is used for the gesture input, can transmit private radio signal (bluetooth as the key of access security system, RF, IR etc.) or the
transfer equipment410 of private file,
fingerprint scanner412, the
camera414 that is used for face recognition,
retina scanners416, be used for the
loudspeaker418 of speech recognition etc.Though about Fig. 4 illustrated authentication mechanism is shown, can also uses other authentication mechanism.
Fig. 5 illustrates the example of
security service module500 according to an embodiment of the invention.
Security service module500 comprises
processor module502,
memory module504 and security service Registration Module 506.
Security service module500 can be module, " plug-in unit " unit, separate unit or the miscellaneous part that exists on another module or equipment.For example, as here describing, security service module can be the assembly of one or more
portable sets112,
server106 and/or
secure resources104, or is carried out by one or more
portable sets112,
server106 and/or
secure resources104.
502 is coupled to security
service Registration Module506 via the communication linkage that is associated so that make
processor module502 and
storer504 can cooperate the processing operation of the module shown in Fig. 5.
Processor module502 comprises CPU510, described CPU510 normally comprises the processor of ALU (ALU) and control module (CU), described ALU is carried out arithmetic sum logical operation, and described control module utilizes ALU to extract instruction where necessary from storer and decodes and carry out them.The I/O interface can be used to operationally couple the assembly of
processor module502.
504 stored programmes, described program comprise web browser for example, algorithm and typical operating system program (not shown), I/O (I/O) program (not shown), bios program (not shown) and help other programs of the operation of security service module 500.The Web browser (not shown) is for example such as Internet Explorer TMThe Internet browser
programs.Memory module504 can be for example such as the electronic storage medium of the electronics storage repositories that can store the data of being used by security service module 500.
Memory module504 can comprise with for example RAM, the ROM of the form storing digital information of bit, EEPROM or other storage mediums of CD, optomagnetic band, CD or floppy disk, hard disk or removable cassette tape for
example.Memory module504 can also be the remote memory that is couple to
processing module502 via wired or wireless two-way communication medium.Receiver/forwarder or
transceiver505 are used to from the portable set received signal.Forwarder is used to transmit signal from secure resources to portable set.
Security
service Registration Module506 comprises the security service of all different safety class.For example,
service groups512 comprises the service of the safe class 1 of for example visiting Email and electronic calendar;
Service groups514 comprises the service of the
safe class2 of for example visiting financial report and address book;
Service groups516 comprises the service of the
safe class3 of for example visiting classified papers; Deng.
Fig. 6 diagram is visited the series of steps of the service of the secure resources with a plurality of safe classes according to an embodiment of the invention.Fig. 6 represents the series of steps of for example storing or the process of program code or algorithm on electronic memory or computer-readable medium.For example, can be on the computer-readable medium of for example ROM, RAM, EEPROM, CD, DVD or other nonvolatile memories or non-provisional computer-readable medium the step of storage map 6.Described process can also be to comprise having program code stored thereon so that carry out the module of the electronic memory of described function.This storer is structurized article.Can as any storer described herein in and for example in
portable set112,
server106 or
secure resources104 storage as the computer program code of the interchangeable form of process flow diagram 600.As shown in Figure 6, described series of steps can be represented as the process flow diagram 600 that can be carried out by the security service module of Fig. 5.Process 600 starts from beginning step 602.
In step 604, authorize the user access right to the secure resources with a plurality of safe classes of for example computing machine.Step 606 expression user request is to the visit in the specific service at secure resources place, for example to the visit of classified papers.As described in about Figure 10, line 607 represents that providing the process flow diagram of the embodiment of electric power to secure resources to portable set is embodiments of the invention.
In step 608, security system determines that whether the security token that provided by him is correct in enough for visiting institute's requested service when authorizing the access right of user to secure resources.If security token is incorrect or not enough, then "No" line 609 is guided step 610 into, and described step 610 expression security system will require portable set that other security tokens are provided.If portable set does not provide more security token, then "No" line 611 is guided step 612 into, and described step 612 expression refusal is to the request of access of described service, and arrival end step 616.If portable set provides other security tokens that obtain from the user in step 610, then "Yes" line 613 draws back step 608.Return refer step 608, if security token is correct in enough, then "Yes" line 615 is guided step 614 into, and the user is authorized in described step 614 expression access right to institute's requested service, and arrives end step 616.
Fig. 7 illustrates the example of
portable set112 according to an embodiment of the invention.In Fig. 7,
portable set112 is depicted as cell phone.Keypad 704 has a plurality of keys that can be used to the access security
resource.Menu button702 and OptionButton 706 can be used to conveniently to be used for the operation of the pattern of visiting, but not make a phone call.
Biometric module708 can be used to obtain biometric data (for example, retina scanning, fingerprint) from the user.Viewing area, user interface or
screen718 can be used to provide available resources 720(a) ... (n) demonstration of (wherein " n " is any suitable numeral).Forwarder 730 can be used to slave
unit112 to any amount of resource (as describing) transmission signal here.According to the transmission intensity of
forwarder730, described equipment can begin communicate by letter (for example, the radio communication) with any resource in the signal distance of equipment 112.Sensor 740 can also be used to determine whether
equipment112 can begin and the communicating by letter of resource.
740 be used to sensing from
equipment112 can accessed resources signal.Sensor can be used to export the
indication742 that described equipment enough is in close proximity to
resource.Indicator742 can be audio frequency and/or the visable representation that detects the
sensor740 of resource, for example LED, light, sound signal, bell sound or other alarms.
Activate or
battery module750 can be used to recognition resource in power-down mode or " sleep " pattern so that preservation electric power.
Active module750 can be in conjunction with
transmitter module730 operation, so that transmit signal to resource from
portable set112, and need be at enable mode but not operate in the power-down mode thereby signal resource.Therefore,
portable set112 can be the resource of non-activation in long-time section by utilizing battery or
active module750 to activate.
112 can be registered in advance to any amount of resource, make if portable set in preset distance,
portable set112 just begins and the communicating by letter of one or more specific resources.For example the sign indicating number of equipment PIN or apparatus figure or device identifier can be used to related one or more equipment of authorizing so that open or visit or the one or more resources of sensing.
112 can also comprise be used to store as here describe for implementing the useful algorithm of access function and one or more storeies of program.
Therefore, can to provide electric power to secure resources also be embodiments of the invention to portable set.For example, in the security system of seldom visit, the power supply that electronic gate may not need to continue keeps its motor system operation, so portable set can provide electric power to start electronic gate.
Fig. 8 illustrates the example of
secure resources104 according to an embodiment of the
invention.Resource104 comprises forwarder 802, authentication module 860,
proximity modules870,
access modules806,
supply socket module842,
storer824 and processor 826.These elements or module can operationally be coupled by bus 890.For example the module of authentication module 860,
proximity modules870 can be that for example
associative processor826 operations are so that the non-provisional electronics storage register of the function of the algorithm of execution storage therein or program code.
802 is used to transmit signal from
resource104 to portable
set.Proximity modules870 is used to detect portable set in the transmission signal distance of resource.Authentication ' unit 860 is used to receive the transmission signal and determine whether the token that is transmitted by portable set is acceptable for certain access level from portable set.The access level of authorizing depends on the type of the token of reception.
806 is used to visit the zone of the
resource104 of being authorized by authentication module 860.
Access modules806 can be lock or latch or electronic access ability.When receiving the mandate of acceptance, this
access modules806 will be provided by (that is, providing or enable access).When not receiving necessary mandate,
access modules806 will can not be opened (that is denied access).
Access modules806 can allow optionally to visit.For example,
access modules806 can allow user capture or check some part of database, forbids checking other parts of the database of the authentication that needs are strengthened simultaneously.
Supply socket module 842 is used to from the portable set received signal so that revise the operator scheme of resource 104.For example, portable set can transmit activation signal, so that make resource become activation from energy or power conservation mode of operation.Power module 842 can also be used to store the minimum power threshold value of the minimum power that representative need receive from portable set so that activate secure resources.In addition, transmit under the situation of electric power signal to portable set at secure resources, power module 842 can be stored the minimum power threshold value of portable set.In addition, power module 842 can receive that electric power activates or electric power transmits signal so that activation of portable formula equipment.This activation can comprise for example makes portable set operate in " waking up " pattern (with respect to " sleep " pattern), or makes portable set transmit the signal of the position of indication portable set.Therefore, portable set and secure resources can be at transferring electric powers each other, and use portable set to activate (wake up or allow visit) secure resources.In addition, the electric power that transmits between resource and portable set can be used to operating resource and/or portable set.For example, resource can have magnetic coil or other power unit that can be used to provide to resource electrical power for operation.Can be by signal activation power unit from portable set.In addition, can charge, recharge by resource or powered portable equipment.Particularly, portable set can be connected to resource so that receive electrical power for operation from described resource.
824 and
processing module826 are used for
resource104 storage data and execution command respectively.
Fig. 9 illustrates the process flow diagram 900 of embodiments of the invention, and portable set provides electric power to secure resources in described embodiment.Describe about Fig. 3 as top, as shown in step 902, portable set provides activation signal to described secure resources when being positioned at the preset distance of particular safety resource be embodiments of the invention.In step 904, make and whether need to provide determining of electric power to secure resources.If not, then "No" line 907 is illustrated in the step 910 and can activates secure resources.If need to determine electric power in step 904, then "Yes" line 905 is illustrated in the power supply unit of the magnetic coil that can activate for example generator that can install in the step 906 in secure resources.Then, as shown in step 908, generator provides the enough electric power of the electricity needs that satisfies secure resources to secure resources.And as shown in step 910, can activate secure resources.On this aspect, as here describing, secure resources has the electric power whether definite portable set is authorized to one or more zones of access security resource.End step 912 these processes of expression finish.In other words, secure resources can be with portable set as power supply so that activation manipulation pattern (with respect to " waking up " pattern of " sleep pattern ") and use the electric power operation generated, maybe can use the portable set signal so that allow visit to secure resources.Therefore, portable set and secure resources can be at transferring electric powers each other.
Figure 10 illustrates the process flow diagram 1000 of embodiments of the invention, and secure resources is provided for authenticating the electric power of portable set in described embodiment.About as described in Fig. 6, as shown in the step 1002, secure resources can be discerned electricity needs so that the authentication portable set is embodiments of the invention as top.In step 1004, secure resources is identified in the current obtainable electric power amount in portable set place.In step 1006, make portable set and whether have enough electric power and satisfy determining of electricity needs.If not, then "No" line 1007 is guided step 1008 into.In step 1008, make secure resources and whether have determining of electricity needs that enough electric power satisfies portable set.If not, then "No" line 1013 is illustrated in and indicates obtainable electric power amount in the portable set in the step 1018.
In step 1008, if secure resources can provide enough electric power to portable set, then "Yes" line 1011 is illustrated in the step 1010 by the user portable set is inserted operation in the secure resources, the electric power that secure resources is provided for authenticating to portable set.Can also carry out electric power transfer by wireless transmission.Line 1023 draws back step 1004, the electric power amount of identification portable set in step 1004.In step 1006, if determine that portable set has enough electric power and satisfies electricity needs, then "Yes" line 1009 is guided step 1012 into.
Whether in step 1012, making portable set by the user needs determining of more electric power.If not, then "No" line 1017 is illustrated in step 1018 middle finger and is shown in obtainable electric power amount in the portable set.Need more electric power if determine portable set in step 1012, then "Yes" line 1015 is illustrated in the step 1014 by the user portable set is inserted operation in the secure resources, and secure resources provides electric power to portable set.Can also carry out electric power transfer by wireless transmission.In step 1016, make electric power by the user determining that whether process finish or stop is provided.If no, then "No" line 1019 draws back step 1014, provides electric power to portable set in step 1014.If determine that by the user electric power provides process to finish or stop, then "Yes" line 1021 is illustrated in the step 1018 obtainable electric power amount in the indication portable set.End step 1020 these processes of expression finish.
Figure 11 illustrates the processing of
portable set112 according to an embodiment of the invention and the example of memory module.Portable set 112 comprises
CPU module1103 and
memory module1105.
CPU1103 and
memory module1105 operationally couple, and make CPU1103 can carry out the processing of the data of storage in storer 1105.Usually,
CPU module1103 is processors, and for example commercially available comprises ALU and other electronic packages and circuit so that carry out the computer processor of data processing.
1105 comprises
power module900, scanner module (fingerprint) 1112, adjacent sensor module 1019,
motion sensor module1108,
camera model1114, scanner module (retina) 1116,
sound identification module1118 and authentication module 1150.I/
O module1115 and GUI1104 also are shown among Figure 11.Normally carry out the program code of the instruction of on non-provisional, computer-readable medium, storing as the described module of in storer, storing, and be to utilize the example component software of one or more nextport hardware component NextPort operations in the sensor assembly as shown in Figure 4.
As described in about Fig. 9,
power module900 is the memory modules that are used to storing process and step and program code, described process and step and program code be for example on non-provisional computer-readable medium, store, can carry out so that determine
portable set112 whether to provide the instruction of electric power by the processor of for example CPU1103 to secure
resources.Power module900 is used to transmit the signal that activates secure resources and electric power signal is
provided.Power module900 can be stored as the threshold value power value that activates the required minimum power of secure resources.Using this minimum value to make does not waste unnecessary electric power when activating secure resources.
1112 provides the module of the computer code of the instruction of for example storing on non-provisional computer-readable medium, when described module is used when the combined with hardware assembly, allow the biometric data of the finger print data that identification for example obtains by the finger print input device that for example is shown as the
element216 here in Fig. 2.
1109 is for example to control sensor so that determine at what distance secure resources will distinguish the program code of portable set.This distance can be based on quantity, the safe class of portable set and the safe class of secure resources of the type of the type of secure resources, portable set, possible portable set.For example, if secure resources has the lower security threshold requirement, then be that portable set is with the sensing secure resources more possibly.If secure resources has high threshold, then secure resources may not provide the portable set can detected signal, and therefore, portable set will can not sense it in the distance of the selection of secure resources.
1109 normally can be via 1115 receptions of I/O module and the combination that transmits the hardware and software component of signal.The code modules of adjacent sensor module shown in Figure 11 and in Fig. 7, hardware is depicted as element 740.Adjacent sensor module (hardware and software) be adapted to be determine can the access security resource selection at what distance
portable set112 part or zone.
1108 is used to detect the motion with respect to the user of portable set 112.
Motion sensor module1108 is stored program code on for example handling from the non-provisional computer-readable medium of the input of the sensor shown in Fig. 4 406.The program code of
motion sensor module1108 determines that the user is making the gesture of what type and user whether in the preselected distance of portable set.The motion that senses may be enough to open or the access security resource, the automatically-controlled door or other secure resources that for example can be only activate by the existence with respect to the user of portable set.
1114 is shown as the memory location of the instruction of the image that storage identification obtains the camera of
camera414 or other image pickup apparatus as shown in Figure 4 from
example.Camera model1114 and nextport
hardware component NextPort414 can be used to distinguish facial characteristics or other images so that allow visit to secure resources.
1116 be shown as memory by using as the program code of the operation of scanner here described in case the biometric data of test example such as retina data so that determine memory location to the visit of secure resources.
1118 is shown as program code stored so that operation and for example distinguishes the sound that obtained by the loudspeaker shown in Fig. 4 418 and the memory location of the speech data of voice.The software of
voice recognition module1118 is adapted to be determines whether the voice signal that receives mates voice signal storage, that authorize and output is confirmed or signal or other output of refusal coupling.
1150 is stored program code in the
storer1105 that can be used to storage instruction, can carry out described instruction so that whether determine secure resources can communicate by letter with portable set by CPU1103, thus and user or holder's visit of authorizing secure resources permission portable set portable
set.Authentication module1150 can be in conjunction with I/
O module1115 operation, described I/
O module1115 be for example operate in case to secure resources, server or other positions send signal or verify data and/or from secure resources, server or other position received signals or verify data so that help to utilize portable set to distinguish and/or forwarder, receiver or the transceiver of the operation of access security resource.
GUI1104 provides user interface so that via user's input operation and control
portable set112 to the user.GUI1104 can comprise keyboard, touch-screen, mouse and other input equipment (not shown) and screen, display or monitor (not shown) in case display image data and audio output apparatus (not shown) so that outputting audio data.
To various embodiment in the embodiments of the invention be described about description above-mentioned and accompanying drawing now.For example, in some cases, portable set itself is a security token.Widely used no key enters in the system in office building, and the mark that you are brandished near the sensor front door is enough to obtain access right, and does not need other authentications.In other cases, need particular portable device.For example, retina scanning visits secure resources if desired, then the user whether use he the portable set that possesses retina scanners or he to use portable set from another user unimportant, because security token is user's an amphiblestroid image, but not portable set itself.
May be implemented as computer software from above understanding the present invention, can be on storage medium or via for example LAN (Local Area Network) or for example the transmission medium of the wide area network of the Internet described computer software is provided.Will also be understood that system component and method step because of some compositions that can in software, implement to be described in the drawings, can be different according to the actual connection between the coding mode system component of the present invention (or treatment step).The instruction of the present invention that gives here to provide, the those of ordinary skill in the association area can be thought deeply these and similarly embodiment or configuration of the present invention.
Should understand and to implement the present invention with the various forms of hardware, software, firmware, dedicated process or its combination.In one embodiment, can be with the application program of the invention process in software on the computer-readable program memory device of for example non-provisional computer-readable medium, visibly comprising.Can upload application program to the machine of for example processor, CPU or the compiler that comprise any suitable architecture, and can carry out described application program by the machine of for example processor, CPU or the compiler that comprise any suitable architecture.
Above disclosed specific embodiment only be illustrative because can be with the difference that those skilled in the art know that of benefiting from the instruction here but the present invention is revised and put into practice to the mode of equivalence.In addition, except what describe in the claim below, be not intended to limit the structure shown here or the details of design.Therefore, disclosed specific embodiment above obviously can changing or revise, and all such variations are considered within the scope and spirit of the invention.Though describe illustrative embodiment of the present invention with reference to the accompanying drawings here in detail, should understand and the invention is not restricted to those definite embodiment, and can carry out various changes and modification there by those skilled in the art, and not deviate from scope and spirit of the present invention by the claims definition.
Claims (18)
1. an external unit obtains the method to the access right of the safety zone of resource, comprising:
Transmission is with the signal of described recognition of devices for authenticating;
Receive the beginning of communicating by letter with described resource;
In response to the beginning of described communication, described authentication mechanism is the hardware device that is used to discern the attribute of user of described equipment by the one or more authentication mechanisms that transmit described equipment;
Reception is to the request of the one or more use in the described authentication mechanism;
The token of each in the authentication mechanism that transmission is asked; And
In response to accept one or more in the described token by described resource and obtain access right to described secure resources.
2. the method for claim 1, the wherein said beginning is radio communication.
3. the method for claim 1, wherein said equipment is portable set.
4. the method for claim 1, wherein said authentication mechanism be described equipment all.
5. the method for claim 1, wherein said authentication mechanism is a biometric.
6. the method for claim 1, wherein biometric data comprises the retina scanning data.
7. the method for claim 1, wherein said authentication mechanism is a password.
8. the method for claim 1, wherein said equipment transmits activation signal to described resource.
9. the method for claim 1, wherein said equipment transmits electric power to described resource and generates signal.
10. a resource is authorized method to the access right of the safety zone of described resource to external unit, comprising:
From the described external unit received signal that can authenticate;
Beginning and described external device communication;
Receive the tabulation of one or more authentication tokens that described external unit can provide, described authentication token is the result of hardware device who is used to discern the attribute of user of described external unit;
Transmission is for the request of one or more authentication tokens;
Receive one or more authentication tokens in response to described request; And
Authorize access right based on the acceptability of described one or more authentication tokens to described external unit to described safety zone.
11. method as claimed in claim 10, wherein said communication is radio communication.
12. method as claimed in claim 10, wherein said authentication token is from biometric equipment.
13. method as claimed in claim 10, wherein said resource transmits activation signal to described external unit.
14. method as claimed in claim 10, wherein said resource transmits electric power to described external unit.
15. a portable set that is used to obtain to the access right of the safety zone of resource comprises:
Forwarder, it transmits the signal of described recognition of devices for authenticating;
Receiver, it receives the beginning of communicating by letter with described resource;
Controller, it transmits by the one or more authentication mechanisms that transmit described equipment and in response to the beginning of described communication;
Wherein said receiver receives the request to the one or more use in the described authentication mechanism;
The token of each in the authentication mechanism that wherein said forwarder transmission is asked; And
Wherein said device responds one or more in the token of accepting by described resource and obtain access right to described safety zone.
16. method as claimed in claim 15, wherein said communication is radio communication.
17. one kind is used for authorizing authentication ' unit to the described resource of the access right of the safety zone of resource to external unit, comprises:
First receiver, it is collected mail number from the described external unit that can authenticate;
Communicator, it begins and described external device communication;
Wherein said receiver receives the tabulation of one or more authentication tokens that described external unit can provide, and described authentication token is the result of hardware device who is used to discern the attribute of user of described external unit;
Forwarder, it transmits the request to one or more authentication tokens;
Wherein said receiver receives one or more authentication tokens in response to described request; And
Authenticator, it is based on the acceptability of described one or more authentication tokens and authorize the access right of described external unit to described safety zone.
18. authentication ' unit as claimed in claim 17, wherein said communication is wireless.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/892,489 | 2010-09-28 | ||
US12/892,489 US9183683B2 (en) | 2010-09-28 | 2010-09-28 | Method and system for access to secure resources |
PCT/US2011/053121 WO2012047564A1 (en) | 2010-09-28 | 2011-09-23 | Method and system for access to secure resources |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103229184A true CN103229184A (en) | 2013-07-31 |
CN103229184B CN103229184B (en) | 2016-03-16 |
Family
ID=45870058
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201180057118.2A Expired - Fee Related CN103229184B (en) | 2010-09-28 | 2011-09-23 | For the method and system of the access to secure resources |
Country Status (5)
Country | Link |
---|---|
US (1) | US9183683B2 (en) |
EP (1) | EP2606449A4 (en) |
JP (1) | JP5816693B2 (en) |
CN (1) | CN103229184B (en) |
WO (1) | WO2012047564A1 (en) |
Cited By (1)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016008089A1 (en) * | 2014-07-15 | 2016-01-21 | Microsoft Technology Licensing, Llc | Brokering data access requests and responses |
Families Citing this family (59)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8578461B2 (en) * | 2010-09-27 | 2013-11-05 | Blackberry Limited | Authenticating an auxiliary device from a portable electronic device |
CN102662554B (en) * | 2012-01-09 | 2015-06-24 | 联想(北京)有限公司 | Information processing apparatus and code input mode switching method thereof |
WO2014028896A2 (en) * | 2012-08-16 | 2014-02-20 | Schlage Lock Company Llc | Operation communication system |
US9172687B2 (en) | 2012-12-28 | 2015-10-27 | Nok Nok Labs, Inc. | Query system and method to determine authentication capabilities |
WO2014105994A2 (en) * | 2012-12-28 | 2014-07-03 | Nok Nok Labs, Inc. | Query system and method to determine authentication capabilities |
EP2763397A1 (en) * | 2013-02-05 | 2014-08-06 | Burg-Wächter Kg | Photoelectric sensor |
US8919024B2 (en) * | 2013-02-06 | 2014-12-30 | Karl F. Milde, Jr. | Secure smartphone-operated gun trigger lock |
US20140230019A1 (en) * | 2013-02-14 | 2014-08-14 | Google Inc. | Authentication to a first device using a second device |
US10270748B2 (en) | 2013-03-22 | 2019-04-23 | Nok Nok Labs, Inc. | Advanced authentication techniques and applications |
US9887983B2 (en) | 2013-10-29 | 2018-02-06 | Nok Nok Labs, Inc. | Apparatus and method for implementing composite authenticators |
US9367676B2 (en) | 2013-03-22 | 2016-06-14 | Nok Nok Labs, Inc. | System and method for confirming location using supplemental sensor and/or location data |
US9961077B2 (en) | 2013-05-30 | 2018-05-01 | Nok Nok Labs, Inc. | System and method for biometric authentication with device attestation |
US20150007280A1 (en) * | 2013-06-26 | 2015-01-01 | Andrew Carlson | Wireless personnel identification solution |
US9712541B1 (en) * | 2013-08-19 | 2017-07-18 | The Boeing Company | Host-to-host communication in a multilevel secure network |
US9230430B2 (en) | 2013-11-27 | 2016-01-05 | Google Inc. | Detecting removal of wearable authentication device |
GB2521614B (en) | 2013-12-23 | 2021-01-13 | Arm Ip Ltd | Controlling authorisation within computer systems |
KR102182297B1 (en) * | 2014-01-13 | 2020-11-24 | 삼성전자 주식회사 | Method Of Finger Scan And Mobile Terminal Supporting The Same |
US9654469B1 (en) | 2014-05-02 | 2017-05-16 | Nok Nok Labs, Inc. | Web-based user authentication techniques and applications |
US9577999B1 (en) | 2014-05-02 | 2017-02-21 | Nok Nok Labs, Inc. | Enhanced security for registration of authentication devices |
US10055567B2 (en) | 2014-05-30 | 2018-08-21 | Apple Inc. | Proximity unlock and lock operations for electronic devices |
PL3161564T3 (en) | 2014-06-25 | 2024-11-18 | Concorde Asia Pte. Ltd. | Security control system for granting access and security control method thereof |
US9875347B2 (en) | 2014-07-31 | 2018-01-23 | Nok Nok Labs, Inc. | System and method for performing authentication using data analytics |
US10148630B2 (en) | 2014-07-31 | 2018-12-04 | Nok Nok Labs, Inc. | System and method for implementing a hosted authentication service |
US9749131B2 (en) | 2014-07-31 | 2017-08-29 | Nok Nok Labs, Inc. | System and method for implementing a one-time-password using asymmetric cryptography |
US9736154B2 (en) | 2014-09-16 | 2017-08-15 | Nok Nok Labs, Inc. | System and method for integrating an authentication service within a network architecture |
GB2531711B (en) * | 2014-10-24 | 2016-09-28 | Canon Europa Nv | Authentication system and method of authentication |
US10462517B2 (en) * | 2014-11-04 | 2019-10-29 | Sony Corporation | Information processing apparatus, communication system, and information processing method |
US9621948B2 (en) | 2015-01-29 | 2017-04-11 | Universal Electronics Inc. | System and method for prioritizing and filtering CEC commands |
WO2016182555A1 (en) * | 2015-05-11 | 2016-11-17 | Interactive Intelligence Group, Inc. | System and method for multi-factor authentication |
US9713002B2 (en) * | 2015-05-15 | 2017-07-18 | Honeywell International Inc. | Access control via a mobile device |
US9857871B2 (en) | 2015-09-04 | 2018-01-02 | Sony Interactive Entertainment Inc. | Apparatus and method for dynamic graphics rendering based on saccade detection |
US9344436B1 (en) | 2015-11-03 | 2016-05-17 | Fmr Llc | Proximity-based and user-based access control using wearable devices |
US9483891B1 (en) * | 2015-11-20 | 2016-11-01 | International Business Machines Corporation | Wireless lock |
US10372205B2 (en) | 2016-03-31 | 2019-08-06 | Sony Interactive Entertainment Inc. | Reducing rendering computation and power consumption by detecting saccades and blinks |
US10192528B2 (en) | 2016-03-31 | 2019-01-29 | Sony Interactive Entertainment Inc. | Real-time user adaptive foveated rendering |
US10401952B2 (en) | 2016-03-31 | 2019-09-03 | Sony Interactive Entertainment Inc. | Reducing rendering computation and power consumption by detecting saccades and blinks |
US10169846B2 (en) | 2016-03-31 | 2019-01-01 | Sony Interactive Entertainment Inc. | Selective peripheral vision filtering in a foveated rendering system |
US9716964B1 (en) | 2016-04-26 | 2017-07-25 | Fmr Llc | Modifying operation of computing devices to mitigate short-term impaired judgment |
CN107801419A (en) * | 2016-06-30 | 2018-03-13 | 慧与发展有限责任合伙企业 | Electronic module access control |
US10637853B2 (en) | 2016-08-05 | 2020-04-28 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
US10769635B2 (en) | 2016-08-05 | 2020-09-08 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
BR112019007529B1 (en) | 2016-10-19 | 2023-12-05 | Dormakaba Usa Inc. | INTERCHANGEABLE LOCK FOR USE WITH A LOCK DEVICE |
CN108615276A (en) * | 2016-12-13 | 2018-10-02 | 乐山加兴科技有限公司 | A kind of visualization access control system |
US10091195B2 (en) | 2016-12-31 | 2018-10-02 | Nok Nok Labs, Inc. | System and method for bootstrapping a user binding |
US10237070B2 (en) | 2016-12-31 | 2019-03-19 | Nok Nok Labs, Inc. | System and method for sharing keys across authenticators |
US11288353B2 (en) * | 2017-07-13 | 2022-03-29 | Western Digital Technologies, Inc. | Data storage device with secure access based on motions of the data storage device |
CN111094676B (en) | 2017-09-08 | 2022-04-08 | 多玛卡巴美国公司 | Electromechanical lock core |
US11868995B2 (en) | 2017-11-27 | 2024-01-09 | Nok Nok Labs, Inc. | Extending a secure key storage for transaction confirmation and cryptocurrency |
US11831409B2 (en) | 2018-01-12 | 2023-11-28 | Nok Nok Labs, Inc. | System and method for binding verifiable claims |
AU2019252796B2 (en) | 2018-04-13 | 2022-04-28 | Dormakaba Usa Inc. | Electro-mechanical lock core |
US11466473B2 (en) | 2018-04-13 | 2022-10-11 | Dormakaba Usa Inc | Electro-mechanical lock core |
US11262839B2 (en) | 2018-05-17 | 2022-03-01 | Sony Interactive Entertainment Inc. | Eye tracking with prediction and late update to GPU for fast foveated rendering in an HMD environment |
US10942564B2 (en) | 2018-05-17 | 2021-03-09 | Sony Interactive Entertainment Inc. | Dynamic graphics rendering based on predicted saccade landing point |
US11270536B2 (en) * | 2018-06-21 | 2022-03-08 | Assa Abloy Ab | Method for remotely unlocking a lock |
EP3591553B1 (en) * | 2018-07-02 | 2022-11-02 | Nxp B.V. | Authentication token and method of operating the same |
US12041039B2 (en) | 2019-02-28 | 2024-07-16 | Nok Nok Labs, Inc. | System and method for endorsing a new authenticator |
US11792024B2 (en) | 2019-03-29 | 2023-10-17 | Nok Nok Labs, Inc. | System and method for efficient challenge-response authentication |
CN110428536A (en) * | 2019-09-09 | 2019-11-08 | 南京工程学院 | A kind of intelligent door lock system |
US12126613B2 (en) | 2021-09-17 | 2024-10-22 | Nok Nok Labs, Inc. | System and method for pre-registration of FIDO authenticators |
Citations (3)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070271596A1 (en) * | 2006-03-03 | 2007-11-22 | David Boubion | Security, storage and communication system |
CN101336436A (en) * | 2005-12-29 | 2008-12-31 | 阿克西奥尼奇有限公司 | Security token and method for authentication of a user with the security token |
US20090198618A1 (en) * | 2008-01-15 | 2009-08-06 | Yuen Wah Eva Chan | Device and method for loading managing and using smartcard authentication token and digital certificates in e-commerce |
Family Cites Families (24)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4843568A (en) | 1986-04-11 | 1989-06-27 | Krueger Myron W | Real time perception of and response to the actions of an unencumbered participant/user |
US4787051A (en) | 1986-05-16 | 1988-11-22 | Tektronix, Inc. | Inertial mouse system |
US5128671A (en) | 1990-04-12 | 1992-07-07 | Ltv Aerospace And Defense Company | Control device having multiple degrees of freedom |
US5528265A (en) | 1994-07-18 | 1996-06-18 | Harrison; Simon J. | Orientation-operated cursor control device |
SE504846C2 (en) | 1994-09-28 | 1997-05-12 | Jan G Faeger | Control equipment with a movable control means |
IL117085A (en) * | 1996-02-08 | 2005-07-25 | Milsys Ltd | Secure computer system |
FR2786047B1 (en) * | 1998-11-13 | 2001-01-05 | Valeo Securite Habitacle | SYSTEM FOR SECURING BIDIRECTIONAL DATA TRANSMISSION FOR ACCESS TO A CLOSED SPACE, PARTICULARLY FOR ACCESS TO A VEHICLE |
US6375572B1 (en) | 1999-10-04 | 2002-04-23 | Nintendo Co., Ltd. | Portable game apparatus with acceleration sensor and information storage medium storing a game progam |
US8103881B2 (en) * | 2000-11-06 | 2012-01-24 | Innovation Connection Corporation | System, method and apparatus for electronic ticketing |
US20020085097A1 (en) | 2000-12-22 | 2002-07-04 | Colmenarez Antonio J. | Computer vision-based wireless pointing system |
US7921297B2 (en) * | 2001-01-10 | 2011-04-05 | Luis Melisendro Ortiz | Random biometric authentication utilizing unique biometric signatures |
US7310734B2 (en) * | 2001-02-01 | 2007-12-18 | 3M Innovative Properties Company | Method and system for securing a computer network and personal identification device used therein for controlling access to network components |
JP4196973B2 (en) * | 2001-04-17 | 2008-12-17 | パナソニック株式会社 | Personal authentication apparatus and method |
US7623970B2 (en) * | 2001-04-17 | 2009-11-24 | Panasonic Corporation | Personal authentication method and device |
JP4094304B2 (en) * | 2002-02-12 | 2008-06-04 | 昌彦 清水 | Fingerprint authentication unlocking system |
JP4293786B2 (en) * | 2002-12-27 | 2009-07-08 | 綜合警備保障株式会社 | Lock device |
US20040212589A1 (en) | 2003-04-24 | 2004-10-28 | Hall Deirdre M. | System and method for fusing and displaying multiple degree of freedom positional input data from multiple input sources |
US7088220B2 (en) * | 2003-06-20 | 2006-08-08 | Motorola, Inc. | Method and apparatus using biometric sensors for controlling access to a wireless communication device |
JP2006163715A (en) * | 2004-12-06 | 2006-06-22 | Shimizu Corp | User authentication system |
US9112705B2 (en) * | 2006-02-15 | 2015-08-18 | Nec Corporation | ID system and program, and ID method |
US20090117883A1 (en) * | 2006-07-20 | 2009-05-07 | Dan Coffing | Transaction system for business and social networking |
US8656472B2 (en) * | 2007-04-20 | 2014-02-18 | Microsoft Corporation | Request-specific authentication for accessing web service resources |
JP5132222B2 (en) * | 2007-08-13 | 2013-01-30 | 株式会社東芝 | Client device, server device, and program |
JP2009238125A (en) * | 2008-03-28 | 2009-10-15 | Nippon Telegr & Teleph Corp <Ntt> | Authentication token, use equipment and authentication system |
-
2010
- 2010-09-28 US US12/892,489 patent/US9183683B2/en active Active
-
2011
- 2011-09-23 CN CN201180057118.2A patent/CN103229184B/en not_active Expired - Fee Related
- 2011-09-23 JP JP2013531693A patent/JP5816693B2/en active Active
- 2011-09-23 WO PCT/US2011/053121 patent/WO2012047564A1/en active Application Filing
- 2011-09-23 EP EP11831232.1A patent/EP2606449A4/en not_active Withdrawn
Patent Citations (3)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101336436A (en) * | 2005-12-29 | 2008-12-31 | 阿克西奥尼奇有限公司 | Security token and method for authentication of a user with the security token |
US20070271596A1 (en) * | 2006-03-03 | 2007-11-22 | David Boubion | Security, storage and communication system |
US20090198618A1 (en) * | 2008-01-15 | 2009-08-06 | Yuen Wah Eva Chan | Device and method for loading managing and using smartcard authentication token and digital certificates in e-commerce |
Cited By (2)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016008089A1 (en) * | 2014-07-15 | 2016-01-21 | Microsoft Technology Licensing, Llc | Brokering data access requests and responses |
US9305178B2 (en) | 2014-07-15 | 2016-04-05 | Microsoft Technology Licensing, Llc | Brokering data access requests and responses |
Also Published As
Publication number | Publication date |
---|---|
JP2013541770A (en) | 2013-11-14 |
JP5816693B2 (en) | 2015-11-18 |
EP2606449A4 (en) | 2017-05-17 |
CN103229184B (en) | 2016-03-16 |
EP2606449A1 (en) | 2013-06-26 |
US9183683B2 (en) | 2015-11-10 |
US20120075062A1 (en) | 2012-03-29 |
WO2012047564A1 (en) | 2012-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103229184B (en) | 2016-03-16 | For the method and system of the access to secure resources |
US11170592B2 (en) | 2021-11-09 | Electronic access control system |
CN104134253B (en) | 2016-08-24 | A kind of gate control system and gate inhibition's deployment method |
US20170195322A1 (en) | 2017-07-06 | Entry and exit control method and apparatus, and user terminal and server for the same |
CN204833393U (en) | 2015-12-02 | Bluetooth and NFC integrated access control management system with image transmission |
CN109493488A (en) | 2019-03-19 | Smart card authentication method, smart lock, smart card, system and device |
KR101570601B1 (en) | 2015-11-19 | An access control method using the mobile device |
TWI604328B (en) | 2017-11-01 | Method and apparatus for dynamic modification of authentication requirements of a processing system |
TW201640258A (en) | 2016-11-16 | User authentication device |
CN106652109A (en) | 2017-05-10 | Intelligent lock control method, device and lock management server |
CN104517338A (en) | 2015-04-15 | Remote door access control system based on wireless network and realization method of remote door access control system |
CN114679916B (en) | 2024-08-06 | Physical access control system and method |
KR102713609B1 (en) | 2024-10-07 | Entrance management system and method thereof |
CN103729903A (en) | 2014-04-16 | Authentication system and method using handset as validation terminal |
CN109949466A (en) | 2019-06-28 | An intelligent access control system and method |
CN104252433B (en) | 2017-05-03 | Method and system for transferring by configuration information of mobile device |
CN205068524U (en) | 2016-03-02 | Intelligent gate inhibition system |
KR20160045308A (en) | 2016-04-27 | Doorlock control system |
KR102726058B1 (en) | 2024-11-05 | Entrance management system and method thereof |
KR102108346B1 (en) | 2020-05-08 | Method and apparatus for unlocking door-lock using time sliced password, and system therefor |
KR20180062692A (en) | 2018-06-11 | Method, user terminal, door lock device and entry security system for controlling of opening and closing door |
KR102344137B1 (en) | 2021-12-29 | System and method for user authentication |
CN206619178U (en) | 2017-11-07 | WiFi matching type automatic access control system |
WO2024224512A1 (en) | 2024-10-31 | Server device, system, server device control method, and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
2013-07-31 | C06 | Publication | |
2013-07-31 | PB01 | Publication | |
2013-08-28 | C10 | Entry into substantive examination | |
2013-08-28 | SE01 | Entry into force of request for substantive examination | |
2016-03-16 | C14 | Grant of patent or utility model | |
2016-03-16 | GR01 | Patent grant | |
2019-09-10 | CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160316 Termination date: 20180923 |
2019-09-10 | CF01 | Termination of patent right due to non-payment of annual fee |